<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2380 Information about the Apache ActiveMQ security vulnerability (CVE-2026-34197)</title><link>https://community.appian.com/support/w/kb/3806/kb-2380-information-about-the-apache-activemq-security-vulnerability-cve-2026-34197</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2380 Information about the Apache ActiveMQ security vulnerability (CVE-2026-34197)</title><link>https://community.appian.com/support/w/kb/3806/kb-2380-information-about-the-apache-activemq-security-vulnerability-cve-2026-34197</link><pubDate>Wed, 29 Apr 2026 15:07:38 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:112c995e-4e87-4e0e-a566-f4afc8ac4265</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/3806/kb-2380-information-about-the-apache-activemq-security-vulnerability-cve-2026-34197#comments</comments><description>Current Revision posted to Appian Knowledge Base by Kaushal Patel on 4/29/2026 3:07:38 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 17 April 2026, a critical vulnerability was &lt;/span&gt;&lt;a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html"&gt;&lt;span style="font-weight:400;"&gt;discovered&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; related to the Apache ActiveMQ software. This vulnerability involves improper input validation and code injection within the Jolokia JMX-HTTP bridge. An authenticated attacker can exploit this flaw by invoking management operations through the Jolokia API to trick the broker into fetching a remote configuration file, leading to arbitrary code execution (RCE) on the broker&amp;#39;s Java Virtual Machine (JVM). Affected versions of Apache ActiveMQ Classic include all versions prior to 5.19.4 and versions 6.0.0 through 6.2.2.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this vulnerability and its services. While affected versions of Apache ActiveMQ are present within the Appian platform, we have confirmed that the Jolokia JMX-HTTP bridge and ActiveMQ web console are not used. Consequently, Appian services are not impacted by this vulnerability. As a proactive security measure, our engineering teams are currently upgrading these packages to the latest secure versions. We will continue to monitor the situation and provide updates as needed.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-34197&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Apache ActiveMQ Improper Input Validation / Remote Code Execution)&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197"&gt;&lt;span style="font-weight:400;"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-34197&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html"&gt;&lt;span style="font-weight:400;"&gt;https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a id="" href="https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/"&gt;https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1jl7jgb3u2"&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;April 29, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the Apache ActiveMQ security vulnerability (CVE-2026-34197)</title><link>https://community.appian.com/support/w/kb/3806/kb-2380-information-about-the-apache-activemq-security-vulnerability-cve-2026-34197/revision/2</link><pubDate>Wed, 29 Apr 2026 15:07:05 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:112c995e-4e87-4e0e-a566-f4afc8ac4265</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/3806/kb-2380-information-about-the-apache-activemq-security-vulnerability-cve-2026-34197#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Kaushal Patel on 4/29/2026 3:07:05 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 17 April 2026, a critical vulnerability was &lt;/span&gt;&lt;a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html"&gt;&lt;span style="font-weight:400;"&gt;discovered&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; related to the Apache ActiveMQ software. This vulnerability involves improper input validation and code injection within the Jolokia JMX-HTTP bridge. An authenticated attacker can exploit this flaw by invoking management operations through the Jolokia API to trick the broker into fetching a remote configuration file, leading to arbitrary code execution (RCE) on the broker&amp;#39;s Java Virtual Machine (JVM). Affected versions of Apache ActiveMQ Classic include all versions prior to 5.19.4 and versions 6.0.0 through 6.2.2.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this vulnerability and its services. While affected versions of Apache ActiveMQ are present within the Appian platform, we have confirmed that the Jolokia JMX-HTTP bridge and ActiveMQ web console are not used. Consequently, Appian services are not impacted by this vulnerability. As a proactive security measure, our engineering teams are currently upgrading these packages to the latest secure versions. We will continue to monitor the situation and provide updates as needed.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-34197&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Apache ActiveMQ Improper Input Validation / Remote Code Execution)&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197"&gt;&lt;span style="font-weight:400;"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-34197&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html"&gt;&lt;span style="font-weight:400;"&gt;https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a id="" href="https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/"&gt;https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1jl7jgb3u2"&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;April 29, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the Apache ActiveMQ security vulnerability (CVE-2026-34197)</title><link>https://community.appian.com/support/w/kb/3806/kb-2380-information-about-the-apache-activemq-security-vulnerability-cve-2026-34197/revision/1</link><pubDate>Wed, 29 Apr 2026 15:06:12 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:112c995e-4e87-4e0e-a566-f4afc8ac4265</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/3806/kb-2380-information-about-the-apache-activemq-security-vulnerability-cve-2026-34197#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Kaushal Patel on 4/29/2026 3:06:12 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 17 April 2026, a critical vulnerability was &lt;/span&gt;&lt;a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html"&gt;&lt;span style="font-weight:400;"&gt;discovered&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; related to the Apache ActiveMQ software. This vulnerability involves improper input validation and code injection within the Jolokia JMX-HTTP bridge. An authenticated attacker can exploit this flaw by invoking management operations through the Jolokia API to trick the broker into fetching a remote configuration file, leading to arbitrary code execution (RCE) on the broker&amp;#39;s Java Virtual Machine (JVM). Affected versions of Apache ActiveMQ Classic include all versions prior to 5.19.4 and versions 6.0.0 through 6.2.2.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this vulnerability and its services. While affected versions of Apache ActiveMQ are present within the Appian platform, we have confirmed that the Jolokia JMX-HTTP bridge and ActiveMQ web console are not used. Consequently, Appian services are not impacted by this vulnerability. As a proactive security measure, our engineering teams are currently upgrading these packages to the latest secure versions. We will continue to monitor the situation and provide updates as needed.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-34197&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Apache ActiveMQ Improper Input Validation / Remote Code Execution)&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197"&gt;&lt;span style="font-weight:400;"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-34197&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html"&gt;&lt;span style="font-weight:400;"&gt;https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197%20https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html%20https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/"&gt;https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1jl7jgb3u2"&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;April 29, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>